86 Vulnerability ManageMent
4.5.2.2 Black Box Testing Once the presence of a host has been estab-
lished and that presence recorded in the memory of the scanner, a series
of tests or “checks” are performed to find vulnerabilities. e types of
checks are dependent upon the type of host and the configuration of
the scanner. Generally, two types of checks are performed. A network-
based or surface check is performed, which involves the probing and
analysis of what is evident with limited or no access to services on
the machine other than what is offered to any other peer on the same
network as that which exists between the scanner and the target. is
is also known as an unauthenticated check. e other type of check
is an authenticated, internal ...